default search action
Aurélien Francillon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Romain Cayre, Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche, Aurélien Francillon:
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers. AsiaCCS 2024 - [c56]Florent Moriconi, Olivier Levillain, Aurélien Francillon, Raphaël Troncy:
X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from Memory. AsiaCCS 2024 - 2023
- [c55]Florent Moriconi, Axel Ilmari Neergaard, Lucas Georget, Samuel Aubertin, Aurélien Francillon:
Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems. SP (Workshops) 2023: 219-227 - [c54]Romain Cayre, Damien Cauquil, Aurélien Francillon:
ESPwn32: Hacking with ESP32 System-on-Chips. SP (Workshops) 2023: 311-325 - 2022
- [c53]Florent Moriconi, Raphaël Troncy, Aurélien Francillon, Jihane Zouaoui:
Automated Identification of Flaky Builds using Knowledge Graphs. EKAW (Companion) 2022 - [c52]Paul Olivier, Xuan-Huy Ngo, Aurélien Francillon:
BEERR: Bench of Embedded system Experiments for Reproducible Research. EuroS&P Workshops 2022: 332-339 - [c51]Giovanni Camurati, Aurélien Francillon:
Noise-SDR: Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software and Its Impact on Emission Security. SP 2022: 1193-1210 - 2021
- [j5]Nassim Corteggiani, Giovanni Camurati, Marius Muench, Sebastian Poeplau, Aurélien Francillon:
SoC Security Evaluation: Reflections on Methodology and Tooling. IEEE Des. Test 38(1): 7-13 (2021) - [c50]Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. AsiaCCS 2021: 687-701 - [c49]Sebastian Poeplau, Aurélien Francillon:
SymQEMU: Compilation-based symbolic execution for binaries. NDSS 2021 - [c48]Merve Sahin, Aurélien Francillon:
Understanding and Detecting International Revenue Share Fraud. NDSS 2021 - [p1]Aurélien Francillon, Sam L. Thomas, Andrei Costin:
Finding Software Bugs in Embedded Devices. Security of Ubiquitous Computing Systems 2021: 183-197 - 2020
- [j4]Giovanni Camurati, Aurélien Francillon, François-Xavier Standaert:
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 358-401 (2020) - [c47]Nassim Corteggiani, Aurélien Francillon:
HardSnap: Leveraging Hardware Snapshotting for Embedded Systems Security Testing. DSN 2020: 294-305 - [c46]Sebastian Poeplau, Aurélien Francillon:
Symbolic execution with SymCC: Don't interpret, compile! USENIX Security Symposium 2020: 181-198
2010 – 2019
- 2019
- [c45]Sebastian Poeplau, Aurélien Francillon:
Systematic comparison of symbolic execution systems: intermediate representation and its generation. ACSAC 2019: 163-176 - [c44]Marc Relieu, Merve Sahin, Aurélien Francillon:
Lenny the bot as a resource for sequential analysis: exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited calls. MuC (Workshopband) 2019 - [c43]Eric Gustafson, Marius Muench, Chad Spensky, Nilo Redini, Aravind Machiry, Yanick Fratantonio, Davide Balzarotti, Aurélien Francillon, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Toward the Analysis of Embedded Firmware through Automated Re-hosting. RAID 2019: 135-150 - 2018
- [c42]Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon:
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. CCS 2018: 163-177 - [c41]Marius Muench, Jan Stijohann, Frank Kargl, Aurélien Francillon, Davide Balzarotti:
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. NDSS 2018 - [c40]Sam L. Thomas, Aurélien Francillon:
Backdoors: Definition, Deniability and Detection. RAID 2018: 92-113 - [c39]Bruno Bierbaumer, Julian Kirsch, Thomas Kittel, Aurélien Francillon, Apostolis Zarras:
Smashing the Stack Protector for Fun and Profit. SEC 2018: 293-306 - [c38]Nassim Corteggiani, Giovanni Camurati, Aurélien Francillon:
Inception: System-Wide Security Testing of Real-World Embedded Systems Software. USENIX Security Symposium 2018: 309-326 - 2017
- [j3]Florian Lugou, Ludovic Apvrille, Aurélien Francillon:
SMASHUP: a toolchain for unified verification of hardware/software co-designs. J. Cryptogr. Eng. 7(1): 63-74 (2017) - [c37]Merve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad:
SoK: Fraud in Telephony Networks. EuroS&P 2017: 235-250 - [c36]Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Towards Automated Classification of Firmware Images and Identification of Embedded Devices. SEC 2017: 233-247 - [c35]Merve Sahin, Marc Relieu, Aurélien Francillon:
Using chatbots against voice spam: Analyzing Lenny's effectiveness. SOUPS 2017: 319-337 - 2016
- [c34]Aurélien Francillon:
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next? TrustED@CCS 2016: 1 - [c33]Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces. AsiaCCS 2016: 437-448 - [c32]Merve Sahin, Aurélien Francillon:
Over-The-Top Bypass: Study of a Recent Telephony Fraud. CCS 2016: 1106-1117 - [c31]Aurélien Francillon:
Trust, but verify: Why and how to establish trust in embedded devices. DATE 2016: 1178-1182 - [i6]Jagdish Prasad Achara, Vincent Roca, Claude Castelluccia, Aurélien Francillon:
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs. CoRR abs/1605.08357 (2016) - 2015
- [c30]Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti:
PIE: Parser Identification in Embedded Systems. ACSAC 2015: 251-260 - [c29]Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon:
C5: Cross-Cores Cache Covert Channel. DIMVA 2015: 46-64 - [c28]Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. RAID 2015: 48-65 - [e2]Aurélien Francillon, Thomas Ptacek:
9th USENIX Workshop on Offensive Technologies, WOOT '15, Washington, DC, USA, August 10-11, 2015. USENIX Association 2015 [contents] - [i5]Andrei Costin, Apostolis Zarras, Aurélien Francillon:
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces. CoRR abs/1511.03609 (2015) - 2014
- [j2]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Aurélien Francillon, Davide Balzarotti:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. EURASIP J. Inf. Secur. 2014: 4 (2014) - [j1]Ghassan Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun:
Microcomputations as Micropayments in Web-based Services. ACM Trans. Internet Techn. 13(3): 8:1-8:23 (2014) - [c27]Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann:
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. AsiaCCS 2014: 305-316 - [c26]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
A minimalist approach to Remote Attestation. DATE 2014: 1-6 - [c25]Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - [c24]Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Confidentiality Issues on a GPU in a Virtualized Environment. Financial Cryptography 2014: 119-135 - [c23]Jonas Zaddach, Luca Bruno, Aurélien Francillon, Davide Balzarotti:
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. NDSS 2014 - [c22]Andrei Costin, Jonas Zaddach, Aurélien Francillon, Davide Balzarotti:
A Large-Scale Analysis of the Security of Embedded Firmwares. USENIX Security Symposium 2014: 95-110 - [c21]Andrei Costin, Aurélien Francillon:
Short paper: a dangerous 'pyrotechnic composition': fireworks, embedded wireless and insecurity-by-design. WISEC 2014: 57-62 - [c20]Jagdish Prasad Achara, Mathieu Cunche, Vincent Roca, Aurélien Francillon:
Short paper: WifiLeaks: underestimated privacy implications of the access_wifi_state android permission. WISEC 2014: 231-236 - [c19]Luca Bruno, Mariano Graziano, Davide Balzarotti, Aurélien Francillon:
Through the Looking-Glass, and What Eve Found There. WOOT 2014 - [e1]Aurélien Francillon, Pankaj Rohatgi:
Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8419, Springer 2014, ISBN 978-3-319-08301-8 [contents] - 2013
- [c18]Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas:
Implementation and implications of a stealth hard-drive backdoor. ACSAC 2013: 279-288 - [c17]Andrei Costin, Jelena Isacenkova, Marco Balduzzi, Aurélien Francillon, Davide Balzarotti:
The role of phone numbers in understanding cyber-crime schemes. PST 2013: 213-220 - [c16]Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting. SECRYPT 2013: 379-386 - [c15]Jelena Isacenkova, Olivier Thonnard, Andrei Costin, Davide Balzarotti, Aurélien Francillon:
Inside the SCAM Jungle: A Closer Look at 419 Scam Email Operations. IEEE Symposium on Security and Privacy Workshops 2013: 143-150 - [c14]Davide Canali, Davide Balzarotti, Aurélien Francillon:
The role of web hosting providers in detecting compromised websites. WWW 2013: 177-188 - 2012
- [c13]Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, Srdjan Capkun:
Analysis of the communication between colluding applications on modern smartphones. ACSAC 2012: 51-60 - [c12]Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, Srdjan Capkun:
Enabling trusted scheduling in embedded systems. ACSAC 2012: 61-70 - [c11]Karim Eldefrawy, Gene Tsudik, Aurélien Francillon, Daniele Perito:
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. NDSS 2012 - [c10]Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun:
Physical-layer attacks on chirp-based ranging systems. WISEC 2012: 15-26 - [i4]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
Systematic Treatment of Remote Attestation. IACR Cryptol. ePrint Arch. 2012: 713 (2012) - 2011
- [c9]Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kâafar:
EphPub: Toward robust Ephemeral Publishing. ICNP 2011: 165-175 - [c8]Aurélien Francillon, Boris Danev, Srdjan Capkun:
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. NDSS 2011 - [c7]Ghassan Karame, Aurélien Francillon, Srdjan Capkun:
Pay as you browse: microcomputations as micropayments in web-based services. WWW 2011: 307-316 - 2010
- [i3]Aurélien Francillon, Boris Danev, Srdjan Capkun:
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. IACR Cryptol. ePrint Arch. 2010: 332 (2010) - [i2]Vincent Roca, Aurélien Francillon, Sebastien Faurite:
Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols. RFC 5776: 1-58 (2010)
2000 – 2009
- 2009
- [b1]Aurélien Francillon:
Attacking and Protecting Constrained Embedded Systems from Control Flow Attacks. Grenoble Institute of Technology, France, 2009 - [c6]Aurélien Francillon, Daniele Perito, Claude Castelluccia:
Defending embedded systems against control flow attacks. SecuCode@CCS 2009: 19-26 - [c5]Claude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente:
On the difficulty of software-based attestation of embedded devices. CCS 2009: 400-409 - [c4]Travis Goodspeed, Aurélien Francillon:
Half-Blind Attacks: Mask ROM Bootloaders are Dangerous. WOOT 2009: 1-6 - [i1]Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices. CoRR abs/0901.3482 (2009) - 2008
- [c3]Aurélien Francillon, Claude Castelluccia:
Code injection attacks on harvard-architecture devices. CCS 2008: 15-26 - 2007
- [c2]Aurélien Francillon, Claude Castelluccia:
TinyRNG: A Cryptographic Random Number Generator for Wireless Sensors Network Nodes. WiOpt 2007: 1-7 - 2005
- [c1]Christoph Neumann, Vincent Roca, Aurélien Francillon, David Furodet:
Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations. CoNEXT 2005: 166-176
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint